1) Malware : Refers to various forms of harmful software, such as viruses and ransomware.
2) Phishing : Is attack, an attacker may send you an email that appears to be from someone you trust
3) A SQL injection : Is attack specifically targets this kind of server, using malicious code.
4) Cross-site (XSS) : scripting attacks can significantly damage a website’s reputation by placing the users' information at risk without any indication
5) DoS Attack : The attacker appearing from many different IP addresses around the world simultaneously, making determining the source of the attack even more difficult for network administrators
6) Session Hijacking and Man-in-the-Middle Attacks : an attacker can hijack the session by capturing the session ID and posing as the computer making a request, allowing them to log in.
7) Credential Reuse: Once attackers have a collection of usernames and passwords from a breached website or service
8) Ransomware : The victim’s system is held hostage until they agree to pay a ransom to the attacker. The name "ransomware” is appropriate because the malware demands a ransom from the victim
9) Password Attack : Passwords are the access verification tool of choice for most people, so figuring out a target’s password is an attractive proposition for a hacker.